facebook linkedin twitter

According to Survey, IoT Use is Up While Trust is Down

According to Survey, IoT Use is Up While Trust is Down

While the Internet of Things has increased in use, that doesn’t mean that its users necessarily trust it just yet. Furthermore, many of these users aren’t fully aware of the actual extent that the IoT has in their lives. These results, from a recent survey by Cisco, could be pertinent to your business and how you manage it. With so many new devices connecting to your network, how can you expect them to affect operations?

Cisco’s survey covers 3,000 North American adults with at least some knowledge of IoT devices. As such, it provides a lot of great information about how businesses and consumers respond to the Internet of Things. Most consumers aren’t necessarily aware of just how far-reaching the Internet of Things can be, even if they use them on a regular basis. In fact, the Internet of Things includes devices that might not have traditionally benefited from a connection to the Internet. Some of these are car navigation systems, street lamps, security systems, and health-monitoring devices.

Most users knew about some of the more familiar and useful Internet of Things devices, but others were amazed by some of the more unusual IoT devices out there. Even though there are disparities in awareness, users generally responded positively to Internet-connected devices, provided they knowingly used them. 53 percent of users claimed that connected devices provided an easier way of life, while 47 percent found that their lives were more efficient with them. 34 percent of users also argue that Internet of Things devices have made them feel more secure.

However, the real kicker of this survey is that only 9 percent of respondents could say that they felt their data was more secure or private thanks to the Internet of Things. Furthermore, 14% of users felt that the way their data was being used wasn’t transparent enough for their liking, which is certainly a major concern. Even if the device helps you, you still have to worry whether or not it’s compromising your security.

Despite these suspicions, it’s likely that the Internet of Things is going to continue growing. Therefore, you must make sure that your company is taking IoT devices into account around your office. Implementing a Bring Your Own Device (BYOD) strategy is the best way to make sure that your business is always aware of devices found on the company network. Implementing such a policy ensures that your business has a plan for personal devices in the workplace, and it can help to limit the damage done by them in the event of an incident.

Computerware can help your business prepare for the Internet of Things. To learn more, reach out to us at (703) 821-8200.

Take Advantage of Comprehensive Network Security w...
How the Business Software Alliance Will Come After...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Managed Service Provider Backup Productivity Workplace Tips Data Hardware Business Saving Money Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business User Tips Computer Smartphones Quick Tips Gadgets Mobile Devices Business Continuity Disaster Recovery Innovation Microsoft Office Mobile Office Virtualization Network Android Social Media Mobile Device Management Server VoIP Collaboration Smartphone Communication Miscellaneous Ransomware Windows 10 Upgrade Unified Threat Management Windows Data Backup Data Recovery Remote Monitoring IT Support Passwords Operating System Tech Term Mobile Computing Vendor Management Managed IT services BYOD Holiday Remote Computing WiFi Cybersecurity Apps Facebook Productivity communications BDR The Internet of Things Analytics Marketing Apple Automation Firewall History Users Outsourced IT Internet of Things Mobile Device Managed IT Services Alert Data Management Phishing IT Consultant Browser Save Money Artificial Intelligence App Health Big data Content Filtering Bandwidth Going Green Gmail Spam Bring Your Own Device Encryption Antivirus Maintenance Office Budget Two-factor Authentication Best Practice Information Technology Lithium-ion Battery Managed IT Hiring/Firing Outlook Hard Drives Cybercrime Windows 8 Help Desk Wireless Technology Search Cost Management Printer Virus Tech Support Office 365 Business Technology Phone System IBM Money Document Management Recovery Cloud Computing Employer-Employee Relationship Computers Saving Time Hacking VPN Travel Update Training SaaS Risk Management It Management Customer Service Hard Drive Save Time Law Enforcement Website Government Compliance Data storage Windows 10 Running Cable Proactive IT Administration Legal Networking Humor Intranet Regulations Education Access Control Computing Data Security Disaster Applications iPhone User Hosted Solution End of Support Business Intelligence Patch Management Blockchain Robot File Sharing Wireless Data Loss Securty Excel Current Events Digital Payment Downtime DDoS Mobility Solid State Drive Customer Relationship Management Augmented Reality Data Breach Social Engineering Comparison Tablet Company Culture Black Market PowerPoint Flexibility Computer Repair Project Management Word Fax Server Laptop Information Social Networking Password Cortana Business Growth Twitter Hacker Machine Learning Paperless Office Telephone Systems Avoiding Downtime Sports Public Cloud Data Protection Specifications Safety Net Neutrality Virtual Desktop Pain Points Identity Theft Chrome Social Managed Service IT service Conferencing Documents User Error Google Maps Router Scam Co-managed IT Heating/Cooling Storage Redundancy Virtual Reality Computer Accessories Politics Bluetooth Monitoring Automobile Emails Gaming Console Chromebook Trending Retail Cryptocurrency Computing Infrastructure Hack Mouse Digital Lifestyle Management Text Messaging How To eWaste Google Docs Webcam Websites Private Cloud Programming Start Menu Tech Terms Experience Download Statistics Value Network Congestion Cleaning Vulnerabilities Mobile Technology Monitors Software as a Service Healthcare Office Tips Telephony Vendor Uninterrupted Power Supply Processors Taxes Streaming Media Inbound Marketing Distributed Denial of Service USB YouTube Bitcoin Unified Communications Settings Presentation Screen Reader Customer Resource management Trojan User Tip Licensing Read Human Resources Drones Gamification Hacks Physical Security Application Windows 7 Relocation Tablets Piracy Upload Organize Banking Botnet cache Television Smart Tech Distribution Permissions Fiber-Optic Language Database Sync Device Management WannaCry Downloads HTML Telephone System Content Management Corporate Profile Mobile Security Notifications CCTV Digital Signature Business Managemenet Time Management Freedom of Information Cost Upselling Reliable Computing Entertainment Music Software License Trends Business Metrics Computer Malfunction Teamwork Assessment SharePoint switches Writing Multi-Factor Security Tip of the week Fraud Tactics Video Surveillance Webinar In Internet of Things online Currency Google Calendar Upgrades Devices LiFi Proxy Server PDF VoIP UTM Content Saving ZTime Touchscreen News Legislation Error Scalability Electronic Medical Records Knowledge IT Plan Enterprise Resource Planning Motion Sickness Best Available LinkedIn Keyboard Consultation Evernote Messenger Tracking Domains Virtual Assistant email scam Work/Life Balance Addiction Debate Technology Tips Deep Learning Accountants A.I. Harddrive Fake News Visible Light Communication Memory GPS Dark Web Archive Audit Multi-factor Authentication Rental Service Meetings Skype Public Speaking Wireless Headphones Telephone Best Practives Health IT Cabling Migration Connected Devices External Harddrive Web Server Shortcut Data Warehousing IT consulting Books Workers Point of Contact Troubleshooting Emergency Hard Drive Disposal Network Management Wi-Fi Administrator Entrepreneur Access Equifax Fleet Tracking Microsoft Excel Advertising Flash 3D Ebay Bookmark Environment Computer Care CIO Device security MSP Thin CLient Microserver Supercomputer HIPAA Windows XP Nanotechnology Social Network Worker Electronic Payment Staffing Google Wallet Desktop Finance Smart Phones Microchip Competition Google Drive Windows Server 2008 Reading Samsung Business Owner Analytic Vulnerability Society Business Cards Service Level Agreement Recycling Spyware Mobile Payment Displays Startup Asset Tracking Get More Done Product Reviews IP Address Unified Threat Management Backup and Disaster Recovery Adminstration Pirating Information Printer Server G Suite Browsers Electricity Printing Micrsooft Username Leadership Turn Key Employer Employee Relationship Data Analysis Printers Managing Stress CrashOverride Regulation Capital 3D Printing Productuvuty